Cover image for Information Security : Policy, Processes, and Practices.
Information Security : Policy, Processes, and Practices.
Title:
Information Security : Policy, Processes, and Practices.
Author:
Goodman, Seymour.
ISBN:
9780765623737
Personal Author:
Physical Description:
1 online resource (296 pages)
Series:
Advances in Management Information Systems, 11
Contents:
INFORMATION SECURITY -- CONTENTS -- SERIES EDITOR'S INTRODUCTION -- REFERENCES -- PART I THE TERRAIN OF INFORMATION SECURITY -- CHAPTER 1 FRAMING THE INFORMATION SECURITY PROCESS IN MODERN SOCIETY -- PARTS AND CHAPTERS -- THE LOGIC OF THE CHAPTERS -- CONCLUSION -- ACKNOWLEDGMENTS -- NOTES -- PART II SECURITY PROCESSES FOR ORGANIZATIONAL INFORMATION SYSTEMS -- CHAPTER 2 INFORMATION SYSTEMS SECURITY STRATEGY: A Process View -- INTRODUCTION -- THREE VIEWS OF STRATEGY PROCESSES FOR INFORMATION SECURITY -- GOALS ASSESSMENT -- SECURITY STRATEGY-SETTING PRODUCTS -- ORGANIZING THE STRATEGY-SETTING PROCESS -- MARSHALLING THE COMPETENCIES -- TOP-DOWN STRATEGY-SETTING PROCESS -- FEDERAL STRATEGY-SETTING PROCESS -- SUMMARY AND OPEN QUESTIONS -- REFERENCES -- CHAPTER 3 IT GOVERNANCE AND ORGANIZATIONAL DESIGN FOR SECURITY MANAGEMENT -- POLICIES-PROCEDURES-PRACTICE -- ORGANIZATIONAL STRUCTURE AND DESIGN -- GOVERNANCE -- INFORMATION SYSTEMS CENTRALIZATION AND DECENTRALIZATION -- THE CASE OF "TECHUNIT" VERSUS "MEDUNIT" -- CONCLUSIONS AND DIRECTIONS FOR FUTURE RESEARCH -- ACKNOWLEDGMENTS -- NOTE -- REFERENCES -- CHAPTER 4 INFORMATION SYSTEM RISK ASSESSMENT AND DOCUMENTATION -- INTRODUCTION -- CURRENT PRACTICES IN RISK ASSESSMENT -- THE TVA MODEL FOR RISK ASSESSMENT -- ASSET IDENTIFICATION -- EXTENDING THE TVA MATRIX -- DOCUMENTING RESULTS OF RISK ASSESSMENT -- PREVIOUS RESEARCH IN THE FIELD OF RISK ASSESSMENT -- CONCLUSION -- REFERENCES -- CHAPTER 5 STRATEGIC INFORMATION SECURITY RISK MANAGEMENT -- INTRODUCTION -- RISK MANAGEMENT: FOUR BASIC TYPES OF TREATMENTS -- ROLE OF RISK ANALYSIS AND SECURITY STANDARDS -- PORTFOLIOS OF RISKS AND RISK TREATMENTS -- FUTURE RESEARCH -- REFERENCES -- CHAPTER 6 SECURITY POLICY: From Design to Maintenance -- INTRODUCTION -- INFORMATION SECURITY POLICY -- INFORMATION SECURITY EDUCATION -- CONCLUSIONS -- REFERENCES.

CHAPTER 7 BUSINESS CONTINUITY PLANNING AND THE PROTECTION OF INFORMATIONAL ASSETS -- INTRODUCTION -- KEY DEFINITIONS -- MTBU -- RISK AND RISK ASSESSMENT -- BEST PRACTICES -- GENERIC PRINCIPLES AND SOLUTIONS -- SPECIALIZED ORGANIZATIONAL STRUCTURES -- MODELS FOR BCP/DR -- NEW STUDIES TO INCREASE UNDERSTANDING OF BCP/DR -- CONCLUSION -- NOTES -- REFERENCES -- PART III PROCESSES FOR SECURING THE EXTRA-ORGANIZATIONAL SETTING -- CHAPTER 8 INFORMATION SECURITY POLICY IN THE U.S. NATIONAL CONTEXT -- INTRODUCTION -- U.S. INFORMATION SECURITY POLICY EVOLUTION -- NATIONAL INFORMATION SECURITY POLICY AS OF 2005 -- CURRENT THREATS AND VULNERABILITIES -- FUTURE DIRECTIONS FOR NATIONAL INFORMATION SECURITY POLICY -- AREAS FOR FURTHER RESEARCH -- NOTES -- REFERENCES -- CHAPTER 9 THE INTERNATIONAL LANDSCAPE OF CYBER SECURITY -- AN EMERGING LANDSCAPE -- INTERNATIONAL INTERGOVERNMENTAL ORGANIZATIONS -- REGIONAL INTERGOVERNMENTAL ORGANIZATIONS -- PRIVATE-PUBLIC ORGANIZATIONS -- MAKING GLOBAL CYBERSPACE MORE SECURE . . . ? -- SUGGESTED INTERNATIONAL CYBERSECURITY RESEARCH TOPICS -- CONCLUSIONS -- ACKNOWLEDGMENTS -- NOTES -- REFERENCES -- PART IV FORCES AND RESEARCH LEADING TO FUTURE INFORMATION SECURITY PROCESSES -- CHAPTER 10 EMERGING UBIQUITOUS COMPUTING TECHNOLOGIES AND SECURITY MANAGEMENT STRATEGY -- INTRODUCTION -- APPLICATIONS AND TECHNOLOGY -- CASE STUDIES -- ELEMENTS OF A SECURITY MANAGEMENT STRATEGY FOR UBICOMP APPLICATIONS -- SECURITY STRATEGY DESIGN AND MANAGEMENT DESIGN -- FUTURE RESEARCH DIRECTIONS -- ACKNOWLEDGMENTS -- NOTES -- REFERENCES -- CHAPTER 11 PROMISING FUTURE RESEARCH IN INFOSEC -- INTRODUCTION -- FUTURE RESEARCH -- CONCLUSION -- REFERENCES -- EDITORS AND CONTRIBUTORS -- SERIES EDITOR -- INDEX.
Abstract:
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our gove.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: